Lab
Faultlines
A deterministic first look at where risk concentrates in your system.
Faultlines
A deterministic first look at where risk concentrates in your system.
What this is
A deterministic threat-modeling pass that surfaces likely failure modes without machine learning or external data. Use it to map trust boundaries, identity, secrets, and deployment risk before deeper review.
Runs entirely in your browser. Nothing is sent to a server.
Who it's for
- Builders who want a fast architecture risk scan.
- Security engineers preparing for design reviews.
- Product teams defining zero-trust boundaries.
Builder notes
This lab is intentionally practical: it is a deterministic pre-review pass to surface risk concentration before deeper threat modeling.
- Run a preset profile first to establish a baseline.
- Change one control at a time and observe score deltas.
- Export markdown and challenge each recommendation in design review.
Learning resources
Use these as review frameworks; this lab provides fast triage, not full risk quantification.
Security Posture
Adjust inputs to improve your posture. Changes update in real-time.
Posture Score
—
High-Risk Faultlines
—
Status
Fill in the form to see your risk profile.
Inputs
Risk Profile
-
Risk Radar
Faultline Scores
Trust Boundaries
Attack Chains
Click to navigateHow compromises cascade between faultlines. Higher scores increase chain severity.
Top Faultlines
Trust Boundary Flow
Faultline Details
Questions to ask next
Export & Share
How Faultlines works
- Rule-based scoring grounded in explicit, inspectable logic.
- Deterministic: the same inputs always produce the same outputs.
- Designed to surface likely risk concentrations and next questions.